Skip to content
Snippets Groups Projects
  1. Sep 14, 2017
    • Peng Xu's avatar
      Allow sensor to use gralloc handle and access ion device · d1a9a2f4
      Peng Xu authored
      Allow sensor hal to sue gralloc handle and access ion device
      so that sensor direct report feature can function correctly when
      HardwareBuffer shared memory is used.
      
      Test: SensorDirectReportTest passes without setenforce 0
      
      Change-Id: I2068f6f4a8ac15da40126892e1326e0b90a6576f
      Merged-In: I2068f6f4a8ac15da40126892e1326e0b90a6576f
      d1a9a2f4
  2. Aug 25, 2017
  3. Aug 24, 2017
    • Mark Salyzyn's avatar
      Switch /data/misc/reboot/last_reboot_reason to persistent property · 006c2e99
      Mark Salyzyn authored
      Switch from /data/misc/reboot/last_reboot_reason to persistent
      Android property persist.sys.boot.reason for indicating why the
      device is rebooted or shutdown.
      
      Introduce protection for all boot reason properties
      
      Protect the following properties with these labels
      
      ro.boot.bootreason      u:object_r:bootloader_boot_reason_prop:s0
      sys.boot.reason         u:object_r:sys_boot_reason_prop:s0
      persist.sys.boot.reason u:object_r:last_boot_reason_prop:s0
      
      Setup the current as-need access rules for each.
      
      ToDo: Remove u:object_r:reboot_data_file after internal fixes.
      
      Test: system/core/bootstat/boot_reason_test.sh
      Bug: 64687998
      Change-Id: I3771c73933e8ae2d94aee936c7a38b6282611b80
      006c2e99
  4. Aug 23, 2017
  5. Aug 17, 2017
  6. Aug 16, 2017
    • Tianjie Xu's avatar
      Allow update_verifier to write to kmsg · d499e914
      Tianjie Xu authored
      Denial message:
      avc: denied { write } for pid=640 comm="update_verifier" name="kmsg"
      dev="tmpfs" ino=13951 scontext=u:r:update_verifier:s0
      tcontext=u:object_r:kmsg_device:s0 tclass=chr_file permissive=0
      
      Bug: 64713327
      Test: update_verifier logs successfully during boot time.
      Change-Id: I421b1e6660239e5ffc624e504f5945d400510407
      d499e914
    • Martijn Coenen's avatar
      Remove display.qservice from service_contexts. · e1887359
      Martijn Coenen authored
      This is a Qualcomm proprietary service,
      and does not belong here.
      
      Test: boot Marlin
      Bug: 63391760
      Merged-In: If7469051f6cef3e2440f7021ae26c9815ff54820
      Change-Id: If7469051f6cef3e2440f7021ae26c9815ff54820
      e1887359
  7. Aug 14, 2017
    • TreeHugger Robot's avatar
    • Steven Moreland's avatar
      Add screencap domain. · 0bf4d0db
      Steven Moreland authored
      am: 6b780b35  -s ours
      
      Change-Id: I61d2951d682b236e7643b7b81eb5c52f84024950
      0bf4d0db
    • Steven Moreland's avatar
      Add screencap domain. · 9216a6ad
      Steven Moreland authored
      Only seeing this denial in permissive:
      allow shell screencap_exec:file getattr;
      
      Bug: 37565047
      Test: adb shell screencap w/o root
      Test: cts-tradefed run cts-dev --module CtsAadbHostTestCases
      Merged-In: I9f31d2067e002e7042646ee38dbfc06687481ac7
      Change-Id: I9f31d2067e002e7042646ee38dbfc06687481ac7
      9216a6ad
    • Steven Moreland's avatar
      Add screencap domain. · 6b780b35
      Steven Moreland authored
      Only seeing this denial in permissive:
      allow shell screencap_exec:file getattr;
      
      Bug: 37565047
      Test: adb shell screencap w/o root
      Test: cts-tradefed run cts-dev --module CtsAadbHostTestCases
      Merged-In: I9f31d2067e002e7042646ee38dbfc06687481ac7
      Change-Id: I9f31d2067e002e7042646ee38dbfc06687481ac7
      6b780b35
  8. Aug 11, 2017
    • Josh Gao's avatar
      Add /dev/kmsg_debug. · 530e168c
      Josh Gao authored
      am: 94e2a921
      
      Change-Id: I3cb9bd4305fe3f6d720f757a232d4bb38de98895
      530e168c
    • Josh Gao's avatar
      Add /dev/kmsg_debug. · 94e2a921
      Josh Gao authored
      Add /dev/kmsg_debug on userdebug devices, to allow crash_dump to log
      crashes to dmesg when logd isn't up yet (or is the one crashing).
      
      Bug: http://b/36574794
      Test: stop tombstoned; crasher; dmesg
      Change-Id: I6ffe11bc613e88198893e82712719522b74fe1be
      94e2a921
    • Nick Kralevich's avatar
      Validate no-cross-domain /proc/PID access · 881fe06f
      Nick Kralevich authored
      am: 7a463809
      
      Change-Id: Iba80938afccd21f0c3b69626223b35c672358e77
      881fe06f
    • Nick Kralevich's avatar
      Validate no-cross-domain /proc/PID access · 7a463809
      Nick Kralevich authored
      Android uses hidepid=2 to restrict visibility to other /proc entries on
      the system. This helps preserve user, application, and system
      confidentiality by preventing unauthorized access to application metadata,
      and addresses attacks such as
      http://www.cs.ucr.edu/~zhiyunq/pub/sec14_android_activity_inference.pdf
      
      Ensure the SELinux (weaker) equivalent is being enforced by adding
      neverallow compile time assertions.
      
      TODO: The "shell" user runs as both an Android application, as well as
      spawned via adb shell. This was a mistake. We should separate out the
      "shell" Android app into it's own SELinux domain. For now, exclude the
      shell from this assertion. (The shell Android app is covered by
      hidepid=2, so there's no leaking of data, but still, it's over
      privileged today and should be cleaned up.
      
      Bug: 23310674
      Test: policy compiles. Compile time assertion only.
      Change-Id: I0e1a6506b2719aabf7eb8127f046c4ada947ba90
      7a463809
  9. Aug 02, 2017
  10. Aug 01, 2017
    • Manoj Gupta's avatar
      Fix static analyzer warnings. · 3cdd4a4b
      Manoj Gupta authored
      Fix the following warnings:
      
      system/sepolicy/tools/sepolicy-analyze/neverallow.c:346:9: warning:
      Potential leak of memory pointed to by '__s1'
      system/sepolicy/tools/sepolicy-analyze/neverallow.c:346:9: warning:
      Potential leak of memory pointed to by 'id'
      system/sepolicy/tools/sepolicy-analyze/neverallow.c:364:13: warning:
      Potential leak of memory pointed to by 'classperms'
      system/sepolicy/tools/sepolicy-analyze/neverallow.c:364:13: warning:
      Potential leak of memory pointed to by 'node'
      
      Bug: b/27101951
      Test:Warnings are gone.
      Change-Id: Ib9b2e0b9f19950b4b764d438ee58340e6c022ef5
      3cdd4a4b
    • Ruchi Kandoi's avatar
      Allow nfc application to set nfc property · 7ceea484
      Ruchi Kandoi authored
      am: df964950
      
      Change-Id: I5e793a78ad471b27fdc0bb88596ab23f6ac43dc4
      7ceea484
  11. Jul 31, 2017
    • Ruchi Kandoi's avatar
      Allow nfc application to set nfc property · df964950
      Ruchi Kandoi authored
      type=1400 audit(1501520483.066:14): avc: denied { write } for pid=3330
      comm=4173796E635461736B202331 name="property_service" dev="tmpfs"
      ino=10749 scontext=u:r:nfc:s0 tcontext=u:object_r:property_socket:s0
      tclass=sock_file permissive=0
      
      Test: No sepolicy denials
      Bug: 64010793
      Change-Id: I8d73e8e19cd4d0a8c61f1f184820c53e5cc2b6d6
      df964950
  12. Jul 29, 2017
  13. Jul 28, 2017
  14. Jul 27, 2017
    • Jeff Vander Stoep's avatar
      domain_deprecated: remove sysfs rules · 8e589af6
      Jeff Vander Stoep authored
      am: 275f6dd5
      
      Change-Id: I02b2eb1a5bbd0cf3a4bbeffbe70e442ba4cf8ee6
      8e589af6
    • Tim Kryger's avatar
      Fix selinux denials during bugreport · b7e1f2dd
      Tim Kryger authored
      
      avc: denied { read } for pid=1704 comm="top" name="stat" dev="proc" ino=4026532297 scontext=u:r:dumpstate:s0 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0
      avc: denied { read } for pid=1636 comm="dumpstate" name="lcd-backlight" dev="sysfs" ino=16592 scontext=u:r:dumpstate:s0 tcontext=u:object_r:sysfs_leds:s0 tclass=lnk_file permissive=0
      avc: denied { call } for pid=2230 comm="dumpsys" scontext=u:r:dumpstate:s0 tcontext=u:r:installd:s0 tclass=binder permissive=0
      avc: denied { create } for pid=1700 comm="ip" scontext=u:r:dumpstate:s0 tcontext=u:r:dumpstate:s0 tclass=netlink_xfrm_socket permissive=0
      
      Bug: 62410287
      Bug: 35350306
      Change-Id: I65be3678c64214ebeb544e0e155bce88b21adf02
      Signed-off-by: default avatarTim Kryger <tkryger@google.com>
      b7e1f2dd
    • Jeff Vander Stoep's avatar
      domain_deprecated: remove sysfs rules · 275f6dd5
      Jeff Vander Stoep authored
      Clean up the remaining granted permissions in domain_deprecated.
      
      avc: granted { read open } for comm="uncrypt"
      path="/sys/firmware/devicetree/base/firmware/android/fstab/compatible"
      dev="sysfs" ino=17591 scontext=u:r:uncrypt:s0
      tcontext=u:object_r:sysfs:s0 tclass=file
      avc: granted { getattr } for comm="uncrypt"
      path="/sys/firmware/devicetree/base/firmware/android/compatible"
      dev="sysfs" ino=17583 scontext=u:r:uncrypt:s0
      tcontext=u:object_r:sysfs:s0 tclass=file
      
      vc: granted { read open } for comm="update_engine"
      path="/sys/firmware/devicetree/base/firmware/android/fstab" dev="sysfs"
      ino=17258 scontext=u:r:update_engine:s0 tcontext=u:object_r:sysfs:s0
      tclass=dir
      avc: granted { getattr } for comm="update_engine"
      path="/sys/firmware/devicetree/base/firmware/android/fstab/compatible"
      dev="sysfs" ino=17259 scontext=u:r:update_engine:s0
      tcontext=u:object_r:sysfs:s0 tclass=file
      
      Bug: 28760354
      Test: build
      Change-Id: Id318ce84894c1001361923f5205de093a15c1e6a
      275f6dd5
    • Jeffrey Vander Stoep's avatar
      Merge "netd: relax binder neverallow rules for hwservices" · d7989e8b
      Jeffrey Vander Stoep authored
      am: 4fc64f2f
      
      Change-Id: I7dd6ea7bb5d767afb98a39e56214dd05d4585c93
      d7989e8b
    • Jeffrey Vander Stoep's avatar
Loading